Pinned Repositories
activitywatch
Log what you do on your computer. Simple (yet powerful), extensible, no third parties.
brown-bags
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
DEFCON27SCRIPTS
scripts to use for KOH and stuff
ignition_key
This is a small BASH script to quickly setup all the tools I would want and need on a new machine.
jekyll-theme-chirpy
A minimal, sidebar, responsive web design Jekyll theme, focusing on text presentation.
kerbrute
A tool to perform Kerberos pre-auth bruteforcing
KeyboardAzertyFr
msdat
MSDAT: Microsoft SQL Database Attacking Tool
nextcloud.com
🌏 Our website
Marnick39's Repositories
Marnick39/brown-bags
Marnick39/activitywatch
Log what you do on your computer. Simple (yet powerful), extensible, no third parties.
Marnick39/Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Marnick39/DEFCON27SCRIPTS
scripts to use for KOH and stuff
Marnick39/ignition_key
This is a small BASH script to quickly setup all the tools I would want and need on a new machine.
Marnick39/jekyll-theme-chirpy
A minimal, sidebar, responsive web design Jekyll theme, focusing on text presentation.
Marnick39/kerbrute
A tool to perform Kerberos pre-auth bruteforcing
Marnick39/KeyboardAzertyFr
Marnick39/msdat
MSDAT: Microsoft SQL Database Attacking Tool
Marnick39/nextcloud.com
🌏 Our website
Marnick39/nzyme
Nzyme is a free and open next-generation WiFi defense system. Go to www.nzyme.org for more information.
Marnick39/Offensive-Security-Engineering-Udemy
Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy
Marnick39/Practical-Ethical-Hacking-Resources
Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course
Marnick39/rfid
Arduino RFID Library for MFRC522
Marnick39/RustScan
🤖 The Modern Day Port Scanner 🤖
Marnick39/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Marnick39/tbhm
The Bug Hunters Methodology
Marnick39/www-community
OWASP Community Pages are a place where OWASP can accept community contributions for security-related content.